About your Search

20120925
20121003
Search Results 0 to 1 of about 2
to respect international law. we probably violated the sovereignty with drones and covert action than we did under brush and there's a whole new set of questions there. i could -- the list could go on it seems like we have problems with the institution and we have problems with our ability to lead within the institution. i was wondering what your reaction to one or both of the issues. one is a generally statement. i agree with the ideas to win. you know, the power the soviet unions were strong. when the soviet union was strong and the idea of liberal internationalism will be strong as we can prove by example. the world of social networking which is the em emulation is hugely a powerful force in the world. .. and the whole number of rather meaningful things are done. the international criminal court . the key of the treaty. the land that -- antipersonnel landmines ban, small arms agreement. all of them were done with the u.s. voting exam. and the votes were like 178 to one and one pattern 46 with 18. those kinds of votes. in the u.s. was the only democracy with the exception of an drolen tip
in another country because of the environmental laws or other laws are more supportive of the needs of their businesses and deliver product to market. so with that, then we are looking at another set of tensions. we are expecting the global supply chain to be available at all times. to enable from an ict perspective our confidentiality of the businesses and then we're demanding those products maintain their integrity. it's no mistake that i'm using the confidencialty integrity and available of information assurance, that's in many ways we're talking about the three tenants of information assurance we're not worried about the integrity of the products coming in to the global supply chain that might comprise the businesses or confidentiality so software behind the actual stuff. the products are being built, delivered maintains, upgraded all around the world and they are vulnerable to opponents who wish it harm. to manipulate the product through the design through the life cycle. and adversaries that may have access to those particular networks or designed to have accessn'ting access t
Search Results 0 to 1 of about 2